Skip to main content
Entropy logoLink to Entropy
. 2020 Jun 16;22(6):668. doi: 10.3390/e22060668

Degrees-Of-Freedom in Multi-Cloud Based Sectored Cellular Networks

Samet Gelincik 1,*, Ghaya Rekaya-Ben Othman 2,*
PMCID: PMC7845776  PMID: 33286440

Abstract

This paper investigates the achievable per-user degrees-of-freedom (DoF) in multi-cloud based sectored hexagonal cellular networks (M-CRAN) at uplink. The network consists of N base stations (BS) and KN base band unit pools (BBUP), which function as independent cloud centers. The communication between BSs and BBUPs occurs by means of finite-capacity fronthaul links of capacities CF=μF·12log(1+P) with P denoting transmit power. In the system model, BBUPs have limited processing capacity CBBU=μBBU·12log(1+P). We propose two different achievability schemes based on dividing the network into non-interfering parallelogram and hexagonal clusters, respectively. The minimum number of users in a cluster is determined by the ratio of BBUPs to BSs, r=K/N. Both of the parallelogram and hexagonal schemes are based on practically implementable beamforming and adapt the way of forming clusters to the sectorization of the cells. Proposed coding schemes improve the sum-rate over naive approaches that ignore cell sectorization, both at finite signal-to-noise ratio (SNR) and in the high-SNR limit. We derive a lower bound on per-user DoF which is a function of μBBU, μF, and r. We show that cut-set bound are attained for several cases, the achievability gap between lower and cut-set bounds decreases with the inverse of BBUP-BS ratio 1r for μF2M irrespective of μBBU, and that per-user DoF achieved through hexagonal clustering can not exceed the per-user DoF of parallelogram clustering for any value of μBBU and r as long as μF2M. Since the achievability gap decreases with inverse of the BBUP-BS ratio for small and moderate fronthaul capacities, the cut-set bound is almost achieved even for small cluster sizes for this range of fronthaul capacities. For higher fronthaul capacities, the achievability gap is not always tight but decreases with processing capacity. However, the cut-set bound, e.g., at 5M6, can be achieved with a moderate clustering size.

Keywords: cloud radio access networks, degrees-of-freedom, sectored cellular networks, limited fronthaul capacity, BBU pools with limited processing capacity, clustered decoding

1. Introduction

Interference is one of the fundamental obstacles for high data rate communications in current and future cellular networks because of restricting the effect on overall spectral efficiency in bits/sec/Hz/base station. Sectorization, which has been used in 4G networks, is one solution to alleviate intra-cell interference by using multiple antennas at base stations (BS) resulting in directional beams that cover an intended sector. In the literature, sectorization is often combined with hexagonal cell models, and mostly each cell is divided into three sectors [1,2]. Here, we follow the works in [3,4,5,6] that totally ignore the interference between the sectors in the same cell. In real systems, this is not the case since the side lobes of the radiation pattern cause to observe signals from adjacent inter-cell sectors. However, we ignore it in the current work since the interference is close to the noise level and our focus will be on the sum-capacity of the sectored hexagonal network in the high signal-to-noise ratio (SNR) and the degrees of freedom (DoF) per-user.

Together with sectorization, cooperation between BSs or mobile users is a well-known technique of decreasing the detrimental effect of interference in cellular networks (see e.g., [7] and references therein). In the context of cellular networks, cooperation has mostly been used to create alternate communication paths (by having mobile users or dedicated terminals relay the transmit signals of adjacent mobiles, see, e.g., [8,9]), or to provide BSs with quantized versions of the transmit/receive signals of other BSs via backhaul links (allowing for clustered decoding, see, e.g., [10,11,12,13,14,15,16]). Cooperation makes it possible for user data to be jointly processed by several BSs at both uplink and downlink, hence imitating the benefits of virtual multiple-input multiple-output (MIMO) architecture. This framework is also known as multi-cell processing (MCP) [7,16]. The study of MCP started for uplink with the works [12,13] and for downlink with the work [14] based on full cooperation assumption. In uplink, the received signals at all BSs are relayed to a central processor (CP) via perfect backhaul links (assumed to be of infinite capacity and error free). Then, the CP decodes all user messages jointly. In contrast, in downlink, the CP encodes all messages jointly and sends each transmit signal to its corresponding BS via backhaul links and each mobile user decodes the message itself. With such a full MCP through unlimited backhaul, there is no signal causing complete interference, that is, all received or transmitted signals provide useful information in decoding at the CP or mobile users. Then, interference becomes constructive rather than destructive. Thus, it is exploited.

The exploitation of interference is also possible by implementing the full MCP with limited capacity backhaul links, which is studied for uplink in [15,16] and for downlink in [17]. In [15,16], BSs share functions of their received signals using compress-and-forward protocol ([18], Theorem 6), where each BS first quantizes its received signal and then sends the quantization codeword to the CP. Then, the CP either decodes the quantization codewords and user messages jointly, or decompress quantization codewords first and then decodes the user messages. However, in the downlink [17], the CP precodes the interference across transmit signals of BSs through joint Dirty Paper Coding (DPC) [19] under individual power constraints for each BS. Therefore, each mobile user decodes its message by cancelling precoded interference. In [16,17], it is shown that the close to optimal performance can be achieved in some scenarios by full MCP with modest capacity backhaul links.

Cloud radio access network (CRAN) is a promising architecture for 5G wireless networks [20] to exploit the interference. For a single-CRAN, each BS in the network acts only as a relay and all BSs are connected to the single base-band-unit pool (BBUP) that performs encoding/decoding functionalities, which mimics the function of a CP, over dedicated rate-limited fronthaul links. Therefore, it allows for natural implementation of full MCP with limited capacity relaying links. In some works such as [3,21,22], the performance of single-CRAN is investigated. For downlink, it is shown in [3] that, when each mobile user and sector receiver have M antennas, M/2 DoF per-user is achievable with moderate fronthaul capacity by applying simple zero forcing scheme with smart assignment of the messages to different BSs. Similar performance can be achieved for uplink by applying the ideas in [21]. However, due to complexity, latency, connectivity, scalability, and synchronization problems, the deployment of multi-cloud radio-access-networks (M-CRAN) is recently considered in a few works such as [23,24,25,26,27,28,29,30]. For example, Reference [27] studies the problem of optimization of precoding and joint compression of baseband signals across multiple clusters of BSs in downlink. It demonstrates that the multivariate compression based solution reduces the inter-cluster interference. A similar model is studied in [28] by adding access channels from BSs to mobile users as a joint optimization parameter besides precoding and fronthaul compression optimization. Reference [29] handles the network sum power consumption minimization problem for downlink M-CRAN while fronthaul capacity, channel state information CSI error, quality of service and BS power are taken into account as optimization constraints in order to to determine the beamforming vector of each user across the network and the optimal quantization noise covariance matrix associated with each cluster. This work proposes a distributed iterative solution that achieves the performance of the case all BSs connected to a single BBUP. While the formerly mentioned works assume non-dynamic clustering for each BBUP, the authors of [30] propose and analyze dynamic clustering approach based on instantaneous CSI, where they also consider the allocation of computation resources of BBUPs as an optimization parameter.

In the present work, we consider uplink of an M-CRAN with multiple-antenna mobile users and multiple-antenna BSs. We assume N1 BSs, KN BBUPs with limited processing capacity and limited fronthaul capacity. The main interest of this paper is to understand highest achievable per-DoF and sum-rate for limited fronthaul and BBUP processing capacity for given BBUP-BS ratio K/N. We propose two coding schemes in each of which some mobile users are deactivated to decompose the network into isolated parallelogram and hexagonal clusters, respectively. For both clustering types, the minimum number of mobile users/sectors are determined regarding a BBUP-BS ratio due to one-to-one association between BBUPs and clusters. Each BBUP collects quantized versions of the received signals of the associated cluster through fronthaul links and decodes them jointly. The considered decoding scheme is thus reminiscent of clustered decoding as performed in [10,31].

The contributions of this paper are:

  • We propose a specific non-dynamic way of silencing mobile users in parallelogram clustering. One could attempt to silence entire cells. We find an efficient way of dividing the network non-interfering parallelogram clusters by silencing mobile users mostly in single sectors of the considered cells;

  • We propose achievability schemes for both parallelogram and hexagonal clusterings and derive lower bounds on per-user DoF for both schemes in a function of fronthaul and BBUP processing capacities and BBUP-BS ratio;

  • We prove that the performance of parallelogram clustering can not be worse than hexagonal clustering for small and moderate fronthaul capacities;

  • We show by simulations that, for high fronthaul capacities, the coding scheme proposed for hexagonal clustering can show better performance than parallelogram clustering if the processing capacity is large enough according to given BBUP-BS ratio.

The upper bound is obtained through cut-set argument. In several cases, upper and lower bounds are matched. For small and moderate fronthaul capacities, the achievability gap is given as a function of fronthaul capacity and BBUP-BS ratio, and it is shown that it decreases with the inverse of the BBUP-BS ratio irrespective of BBUP processing capacity.

In the finite SNR case, we compare the proposed coding schemes with the following schemes:

  • Naive versions of both schemes where all mobile users in certain cells are deactivated,

  • Interfering versions of both schemes where the network is decomposed into non-overlapping but interfering clusters,

  • An opportunistic scheme where each message is decoded based on the received signals of three neighboring sectors that have the strongest channel gains.

Finite SNR analysis shows that, in the strong interference regime, the proposed schemes outperform all other schemes for almost all SNR range under all scenarios except two; for the 3-sector decoding scheme, low SNR range and scarce BBUP capacities and, for non-interfering schemes, moderate SNR range and high BBUP capacities.

An interesting outcome of the finite SNR analysis is that interfering clustering schemes show either close to or better performance than proposed schemes in the finite SNR range under both weak and strong interference regimes; therefore, the interfering clusterings can be employed at finite SNR values with minor performance losses, since they may be more convenient for practical systems.

1.1. Organization

The rest of the paper is organized as follows: This section ends with some remarks on notation. The following Section 2 describes the problem definition. Section 3 presents the main results of the paper. In Section 4 and Section 5, we present the coding schemes for the parallelogram and hexagonal clusterings, respectively. Section 6 presents the achievability results for the naive schemes and Section 7 presents simulation results for DoF per-user. In Section 8, we present the results regarding the finite SNR analysis. We conclude the paper with Section 9 and some technical proofs are presented in the appendices.

1.2. Notation

We denote the set of all integers by Z, the set of positive integers by Z+, and the set of real numbers by R. For other sets, we use calligraphic letters, for example, X. We represent random variables by uppercase letters, for example, X, and their realizations by lowercase letters, for example, x. We use boldface notation for vectors, that is, upper case boldface letters such as X for random vectors and lower case boldface letters such as x for deterministic vectors.) Matrices are depicted with sans serif font, for example, H. We also write X(n) for the tuple of random vectors (X1,,Xn).

2. Problem Definition

2.1. Network Model

Consider the uplink communication in a cellular network consisting of N1 hexagonal cells as depicted in Figure 1. Each single cell contains a base station (BS) equipped with 3M directional receive antennas and is divided into three sectors, where each sector is covered by M receive antennas. Usage of directional antennas, where side lobe radiation patterns are negligible, implies that communications in the three sectors of a cell do not interfere with each other. It is assumed that different mobile users in the same sector perform orthogonal multiple-access as is typical for current 4G networks [32]. Thus, the model is restricted to a single mobile user per sector. For simplicity and symmetry, it is supposed that each mobile user is equipped with M transmit antennas.

Figure 1.

Figure 1

Multi-cloud based sectored cellular network.

It is assumed that the signal from a mobile user attenuates rapidly enough so that it cannot cause interference to sector receive antennas (Rx) in non-adjacent sectors. These assumptions lead to the interference graph in Figure 1, where each small circle depicts a mobile user and Rx pair. Solid black lines between any two circles represent symmetric interference between mobile users and Rxs of adjacent sectors. Let N=1,,N be an index set of all cells and associated BS in the network, and let T=1,,3N be index set of all sectors and their corresponding users and Rxs. Then, the observed signal at the Rx uT is given by the following discrete-time input-output relation:

yu,n=υTuHu,υxυ,n+zu,n,n{1,,n}, (1)

where

  • n denotes the number of channel use;

  • Tu denotes the index set of mobile users whose transmitted signal is observed by Rx u (including mobile user u);

  • xv,n denotes the M-dimensional time-n signal sent by mobile user v;

  • zu,n denotes the M-dimensional i.i.d. standard Gaussian noise vector corrupting the time-n signal at Rx u; it is independent of all other noise vectors;

  • and Hu,υ denotes an M-by-M dimensional random matrix with entries that are independently drawn according to a standard Gaussian distribution that models the channel from mobile user υ to Rx u.

Channel matrices are randomly drawn but assumed to be constant over the n channel uses employed for the transmission of a message. In other words, the block length of a transmission is assumed shorter than the coherence time of the channel. Realizations of the channel matrices are assumed to be known by corresponding BSs, but not by the mobile users.

2.2. Uplink Communication Model with M-CRAN Architecture

Consider the network model defined in Section 2.1. Assume that the mobile user in sector uT wishes to send its message Wu, which is selected at random from the set 1,,2nRu, to the BS in which its sector is located. To this end, mobile user u encodes its message with the function

fun:WuRM×n,WuXun (2)

where Xun=Xu,1,,Xu,n, and Xu,nRM is a column vector for n=1,,n, satisfying the power constraint:

1nn=1nXu,n2Pwithprobability1. (3)

We assume that the decoding processes of receive signals during the uplink communication is performed by KN BBUPs, and that any BS jN can have access to any BBUP k1,,K through a one-hop fronthaul link which can be modeled as noise-free but capacity limited.

Definition 1.

Observation Function Let Uk be the index set of BSs communicating with BBUP k. Each BS jUk sends an observation function, ϕj,knYBj3n, to BBUP k, where

ϕj,kn:RM×3nR, (4)

and

YBj3n:=Yuj,1n,Yuj,2n,Yuj,3n, (5)

with uj,1, uj,2, and uj,3 denoting the three sectors of BS j.

To account for capacity limits of the fronthaul links, we require

1nk=1KHϕj,knYBj3nCF,j, (6)

where CF=μF·12log(1+P) and μF is fronthaul capacity prelog, which is a positive constant.

Let Dk be the index set of sectors whose messages are to be decoded at BBUP k. After receiving observation functions, for each BBUP k and each uDk, BBUP k applies a deterministic and invertible function gk,un on the relevant observation functions to decode the message Wu:

W^u=gk,unϕl,knYBl3nlUk. (7)

Decoding is successful if, for all uT:

W^u=Wu. (8)

Increasing computational power of a processor leads to an increase in complexity. Hence, to take the computational limitation into consideration, we impose a complexity constraint on the BBUPs in terms of bit processing capacity per channel use. We assume that any BBUP k can implement the decoding process if and only if the sum rate of all observation functions that is sent to BBUP k satisfies

1njUkHϕj,knYBj3nCBBU,k, (9)

where CBBU=μBBU·12log(1+P) and μBBU is processing capacity prelog, which is a positive constant.

2.3. Capacity and Degrees of Freedom

A rate-tuple RuuT is said to be achievable if, for every ϵ>0 and sufficiently large n, there exists encoding, observation, and decoding functions fun, ϕj,kn, and gk,jn satisfying (3), (6) and (9), such that

PruTW^uWuϵ. (10)

The capacity region CP,μF,μBBU,K is the closure of all achievable rate-tuples RuuT, and the maximum sum-rate is defined as

CP,μF,μBBU,K=supuTRu (11)

where the supremum is over all achievable rates RuuTCP,μF,μBBU,K.

Definition 2

(Per-User DoF). For any BBUP-BS ratio r0,1, fronthaul capacity prelog μF>0 and processsing capacity prelog μBBU>0, the per user DoF is given as

DoFμF,μBBU,r:=limNlimPCP,μF,μBBU,r·N|T|·12log(1+P). (12)

Here, note that the allowed interval of r guarantees satisfying the proposed system model restriction KN. In the following, we use the abbreviation DoF to designate the per-user DoF.

3. Main Results

We derive two lower bounds and an upper bound on the DoF. As we will show, they match in some cases. The first and second lower bounds are achieved by the schemes described in Section 4 and Section 5, respectively. Both schemes are based on deactivating a set of mobile users. In the first scheme, the mobile users are deactivated so that the remaining active users form parallelogram-like clusters. In the second, the remaining active users form hexagon-like clusters. We name the two DoF lower bounds as parallelogram bound and hexagon bound, respectively.

Theorem 1

(Lower Bound). For any μBBU>0, μF>0, and 0<r1, the achievable DoF is given by

DoFμBBU,μF,rconv hullDoFPμBBU,μF,r,DoFHμBBU,μF,r (13)

where

DoFPμBBU,μF,r=maxt1,t2minμF3,μBBU3t1t2,ifμFMmaxt1,t2minM+μFt1t213t1t2,μBBU3t1t2,ifMμF2Mmaxt1,t2minM2t1+2t23+μFt1t2t1t2+13t1t2,μBBU3t1t2,if2MμF3Mmaxt1,t2minM1t1+t23t1t2,μBBU3t1t2,if3MμF (14)

where above maximizations are over all positive integers t1,t2 satisfying t1t21r, and

DoFHμBBU,μF,r=maxtminμF3t219t2,μBBU9t2,ifμF2MmaxtminM6t6+μF3t23t+29t2,μBBU9t2,if2MμF3MmaxtminM3t13t,μBBU9t2,if3MμF (15)

where above maximizations are over all positive integers t satisfying t13r.

Proof. 

The proof is given in Section 4 and Section 5.  □

Remark 1.

For μBBU>0 and 0<r1

DoFPμBBU,μF,rDoFHμBBU,μF,rforμF2M

Proof. 

The proof is given in Appendix A.  □

Theorem 2

(Cut-Set Bound). For any μBBU>0, μF>0 and 0<r1, the achievable DoF is upper bounded by

DoFμF,μBBU,rminμBBU3·r,μF3,M (16)

Proof. 

The proof is given in Appendix B.  □

Corollary 1

(Optimality in some special cases).

  • If μFM and μFμBBU1r, then
    DoFμF,μBBU,r=μF3. (17)
  • If μFM, 1rZ+ and μBBUμFr, then
    DoFμF,μBBU,r=μBBU3·r. (18)
  • For MμF2M
    DoFμF,μBBU,r=μBBU3·r, (19)
    if μBBUminM+μFt1t21,μFr and 1rZ+, where t1,t2 is the integer solution to t1t2=1r.
  • For 2MμF3M
    DoFμF,μBBU,r=μBBU3·r, (20)
    • -
      if μBBUminM2t1+2t23+μFt1t2t1t2+1,μFr, 1rZ+ and 13rZ+, where t1,t2 is the integer solution to t1t2=1r that minimizes t1+t2, or
    • -
      if μBBUminM6t6+μF3t23t+2,μFr and 13rZ+, where t=13r.
  • For 3MμF
    DoFμF,μBBU,r=μBBU3·r, (21)
    • -
      if μBBUminM3t1t2t1t2,μFr, 1rZ+ and 13rZ+, where t1,t2 is the integer solution to t1t2=1r that minimizes t1+t2, or
    • -
      if μBBUminM9t23t,μFr and 13rZ+ where t=13r.

Proof. 

The proofs are given in Appendix C.  □

Theorem 3.

The achievability gap ΔμF,μBBU,r is upper bounded by

ΔμBBU,μF,r<μF3·1rIfμF2M (22)

Proof. 

The proof is given in Appendix D.  □

4. Uplink Scheme with Parallelogram Clustering

In the proposed uplink scheme, we deactivate a subset of mobile users so as to partition the network into non-interfering clusters of active users. These clusters have parallelogram shapes and are parametrized by positive integer pair t1,t2.

4.1. Construction of Parallelogram Clusters

For a given t1,t2 pair, we define a regular parallelogram grid such that the length of sides of a parallelogram in the diagonal direction (−30 degree with horizontal axis) is t1 cell-hop length, and the length of sides in the vertical direction is t2 cell-hop length. Then, we fit this parallelogram grid into our figurative network in a way that the intersections of the parallelogram grid coincide with BSs, which are supposed to be at the center of the cells. Subsequently, we deactivate all mobile users coinciding with the sides of the grid. This process divides the network into parallelogram-like non-interfering clusters of active users and their sectors, and we refer to them shortly as p-clusters. In Figure 2, we present an example of parallelogram clustering for t1,t2=2,2, where users coinciding with green lines are deactivated. Throughout this section, we refer to active users as only users. Users of a p-cluster are located in:

  • t11t21 BSs with three users,

  • 2t11+2t21 BSs with two users,

  • Single BS with one user.

Figure 2.

Figure 2

Parallelogram clustering for t1,t2=2,2.

Therefore, the number of users np in a p-cluster is:

np=3t1t2t1t2. (23)

Let K=1,,Kp, with KpK, be index set of p-clusters. We associate each p-cluster with single BBUP and denote the associated BBUP with the same index kK of the p-cluster. Let Ik be the index set of BSs whose users are elements of kth p-cluster. Each BS jIk sends an observation function to kth BBUP, i.e., Uk=Ik.

To be able to find a BBUP-BS ratio, we need to equally partition all BSs to BBUPs. Note that any BS jN with one user or three users is an element of a single index set Ik, kK, and any BS jN with two users is an element of two different index sets, i.e., Ik and Ik1, k,k1K. Therefore, of the Ik BSs of p-cluster k, we associate all of them with one user or three users, and half of them with two users to the BBUP k. This leads to the BBUP-BS ratio rp:

rp=1t1t2. (24)

We can choose any t1,t2Z+ pair to construct p-clusters that satisfies rpr:

t1t21r. (25)

4.2. Coding Scheme

Each mobile user u encodes its message Wu, which is uniformly distributed over the set Wu=1,,2nRu, with a multi-antenna Gaussian codebook of power P. Since Rxs of silenced user observe only interference, each BS j generates its observation function for (active) Rxs through independent quantization codebooks. To generate quantization codebooks, each BS j applies a point-to-point Gaussian vector quantizer to receive signal of each Rx so that the noise-level quantization rates imposed in the following are satisfied. Let Jk denote the sector index set of p-cluster k. We choose Dk=Jk, where Dk is an index set of sectors whose messages are to be decoded at BBUP k. Each BS jIk with three users transmits a message consisting of three quantization messages of its Rxs to BBUP k and each BS jIk with two users transmits only quantization message of Rx u to BBUP k if uJk. The BS jIk with a single user transmits the only quantization message of its cell to the BBUP k. Depending on the prelogs μBBU and μF, there are three different quantization rates: all BSs with three users quantize each receive signal at the rate Rq1=μq112log(1+P) and all BSs with two users quantize each receive signal at the rate Rq2=μq212log(1+P), and all BSs with one active user quantize their receive signals at the rate Rq3=μq312log(1+P). After receiving quantization messages, each BBUP k reconstructs all observations with quantization noise term, i.e., {Y^u(n)}uDk. The input–output relationship experienced by each BBUP k is a multi-user MIMO-MAC channel ([33], Chapter 9) and [34], where the effective noise is the sum of channel and quantization noises. Since the channel matrix from mobile users of Dk to Rxs of Dk is known by BBUP k and is square and full rank with probability 1, each BBUP k can perform joint decoding with vanishingly small average error probability, which leads to achieving the same DoFs as if each user message is decoded in a point-to-point communication. That is, the prelogs μq1, μq2 and μq3 are achieved for respective mobile users.

To be able to find DoF for asymptotic case (The limit N is only needed to eliminate edge effects.), i.e., while N, we need to equally partition deactivated users of the network to p-clusters. Note that deactivated users around a p-cluster are located on green lines of four different sides and each side is on the border of two p-clusters. Therefore, when half of the deactivated users around a p-cluster, i.e., t1+t2, are associated with the p-cluster itself, the equal partition of the deactivated users is performed. Then, the DoF of the scheme can be obtained as:

DoFPμF,μBBU,r=μq13t1t23t13t2+3+μq22t1+2t24+μq33t1t2 (26)

where the expression in the numerator refers to the sum-DoF in a given p-cluster and the expression in the denominator refers to the total number of active and deactivated users for a given p-cluster. In the following, we will give a policy to choose quantization rates for any t1,t2 satisfying (25).

4.2.1. Case 1: μBBUnpM

The DoF of M×M MIMO system with independently fading channels, which is our case, is M as given in [35]: the quantization rate M2log(1+P) is enough to describe message set Wu of any user u asymptotically. Thus, here, we are not restricted by the processing capacity prelog μBBU, i.e., the only restricting factor is fronthaul capacity prelog μF. The main policy is to distribute transmission resources between (active) users of any given BS unless the per sector transmission capacity is more than the rate providing maximum DoF M, i.e., M2log(1+P). To this end, we determine the quantization rates regarding μF:

  • If μFM, transmission resource of a fronthaul link is allocated equally among Rxs of a BS:
    Rq1=μF3·12log(1+P),Rq2=μF2·12log(1+P),Rq3=μF12log(1+P),
    and the achievable DoF is given as
    DoFPμF,μBBU,r=μF3. (27)
  • If MμF2M, transmission resource of a fronthaul link is equally allocated among Rxs of a BS with two or three users; however, any BS with one user quantizes its received signal at the maximum rate since each fronthaul link has enough capacity to support that communication rate (MμF):
    Rq1=μF3·12log(1+P),Rq2=μF2·12log(1+P),Rq3=M12log(1+P),
    and the achievable DoF is given by
    DoFPμF,μBBU,r=μFt1t21+M3t1t2. (28)
  • If 2MμF3M, transmission resource of a fronthaul link is equally allocated among Rxs of a BS with three users; however, any BS with one or two users quantizes their receive signals at the maximum rate for each Rx since each fronthaul link has enough capacity to support that communication rate (MμF2):
    Rq1=μF3·12log(1+P),Rq2=M12log(1+P),Rq3=M12log(1+P),
    and the achievable DoF is given by
    DoFPμF,μBBU,r=μFt1t2t1t2+1+M2t1+2t233t1t2. (29)
  • If 3MμF, all BSs quantize their receive signal at the maximum rate at each sector (MμF3):
    Rq1=Rq2=Rq3=M·12log(1+P),
    and achievable DoF is given as:
    DoFPμF,μBBU,r=M1t1+t23t1t2. (30)

4.2.2. Case 2: μBBUnpM

Under this condition, the achievable sum-DoF of a p-cluster, which is given in the numerator of (26), can be restricted by the processing capacity prelog μBBU. If the μBBU is not smaller than the achievable sum-DoF of a p-cluster for the given interval of μF:

  • If μFt1t2μBBUnpM for μFM,

  • If μFt1t21+MμBBUnpM for MμF2M,

  • If μFt1t2t1t2+1+M2t1+2t23μBBUnpM for 2MμF3M,

  • If μBBU=npM for μF3M,

The process that has been implemented in Section 4.2.1 is applied and, hence, the DoF expressions are given as in (27), (28), (29) and (30), respectively. However, if the processing capacity prelog μBBU is smaller than the sum-DoF for the given μF:

  • If μBBUμFt1t2 for μFM,

  • If μBBUμFt1t21+M for MμF2M,

  • If μBBUμFt1t2t1t2+1+M2t1+2t23 for 2MμF3M,

  • If μBBUnpM for μF3M,

We distribute the processing resource of a BBUP equally among sectors of a cluster and the quantization rate at each sector is chosen as

Rq1=Rq2=Rq3=μBBUnp·12log(1+P),

which leads to:

DoFPμF,μBBU,r=μBBU3t1t2. (31)

To provide fairness among the achievable DoFs of users, instances of the proposed scheme are time-shared so that each mobile user takes all relative positions in a p-cluster, which requires

1rp=t1t2, (32)

different instances.

5. Uplink Scheme with Hexagon Clustering

The same as done in the last section, we deactivate a subset of mobile users so as to partition the network into non-interfering clusters of active users and their sectors. The shape of the clusters is hexagon and the size of the hexagons are set by a positive integer t.

5.1. Construction of Hexagon Clusters

For a given design parameter t, we choose some BSs as center BSs to construct a regular grid of equilateral triangles where every three closest center BSs are 2t cell-hops apart from each other. Therefore, the maximum distance to the closest center BS is t cell-hops and we name the BSs whose distance is cell-hops to the closest center BS as layer-“” BSs, for =1,,t. We determine all BSs located at t cell-hops above and below of any center BS as corner and null BSs, respectively. Then, we create solid green lines between any closest null and corner BSs (t cell-hop apart from each other), which creates hexagon grids along the entire network. Subsequently, we deactivate mobile users coinciding with solid green lines. This process divides the network hexagon-like non-interfering clusters and we shortly name as h-clusters (The hexagonal clustering is first presented in [36].). Figure 3 shows an example of partition for t=3. Later on, we refer to active users as only users. In an h-cluster,

Figure 3.

Figure 3

Illustration of h-clusters for t=3. Pink, red, and blue cells represent center, corner, and null cells, respectively. Green-filled circles refer to deactivated users. All users and their sectors inside a blue dashed hexagon are associated with the same BBUP.

  • There are three users in center BS,

  • There are 6 layer-“”, =1,,t1, BSs with 3 users around center BS, i.e., in total 3·=1t16=9t29t,

  • There are 6t3 users in layer-“t” BSs.

Therefore, the number of users in a h-cluster, nh, is:

nh=9t23t. (33)

Let K=1,,Kh, with KhK, be index set of h-clusters. We associate each h-cluster with single BBUP and denote the associated BBUP with the same index kK of the h-cluster. Let Ik be the index set of BSs whose users are elements of kth h-cluster. Each Ik BS sends an observation function to kth BBUP, i.e., Uk=Ik.

To be able to find a BBUP-BS ratio, rh, we need to equally partition all BSs to BBUPs. Note that each layer-t BS, except the one in the corner, belongs to two different index sets, i.e., Ik and Ik1, k,k1K. Each corner BS is an element of three different index sets, i.e., Ik, Ik1 and Ik2, k,k1,k2K. In addition, note that each null BS around a h-cluster k is on the border of three different h-clusters. To this end, of the Ik BSs and null BSs around h-cluster k, we partition all layer-“”, =1,,t1, BSs including center BS, half of the layer-t BSs except corner and null BSs, and one third of corner and null BSs to the BBUP k, which leads to:

rh=13t2. (34)

Since we have a given ratio r, we can choose any tZ+ such that rhr, i.e.,

t13r. (35)

5.2. Coding Scheme

Each mobile user u encodes its message Wu, which is uniformly distributed over the set Wu=1,,2nRu, with a multi-antenna Gaussian codebook of power P. As in Section 4, after observation at sector antennas, each BS j generates observation function for (active) Rxs through independent quantization codebooks. To generate quantization codebooks, each BS j applies a point-to-point Gaussian vector quantizer to a received signal of each Rx such that the following noise-level quantization rate constraints are met. Let Jk denote the sector index set of h-cluster k. We choose Dk=Jk. Each BS jIk of layer-“”, =1,,t1, transmits a message consisting of three independent quantization messages of Rxs to BBUP k and each BS jIk of layer-“t” transmits only quantization message of sector u to BBUP k if uJk. Depending on the prelogs μBBU and μF, there are two different quantization rates: Each BS with three users quantize each receive signal at the rate Rq1=μq112log(1+P) and each BS with two users quantize each receive signal at the rate Rq2=μq212log(1+P). That is, in h-cluster k, the receive signals of all layer-“” BSs, =1,,t1, and the receive signals of every corner BS is quantized at rate Rq1, i.e., 9t29t+6, and receive signals of layer-“t” BSs other than corner BSs are quantized at Rq2, i.e., 6t6. After obtaining quantization messages, BBUP k reconstructs all {Y^u(n)}uDk with quantization error. The input–output relationship experienced at the BBUP k is multi-user Gaussian MIMO-MAC. Then, each BBUP k performs joint decoding with vanishingly small probability of error since the channel matrix from users of Dk to Rxs of Dk is known by BBUP k and is square and full rank with probability 1. This leads to achieving DoFs μq1 and μq2 for respective mobile users.

To be able to find DoF for asymptotic case, i.e., N, we need to equally partition deactivated users of the network to h-clusters. The number of deactivated users around h-cluster k is 6t. Since each deactivated user is on the border of two h-clusters, to be able to find DoF of the scheme, we partition half of them, i.e., 3t, to users of h-cluster k, which gives the DoF expression:

DoFμF,μBBU,r=μq19t29t+6+μq26t69t2. (36)

In the following, we will give the policy for choosing quantization rates.

5.2.1. Case 1: μBBUnhM

In Section 4.2.1, μF is the only limiting factor since the quantization rate M·12log(1+P) is enough to describe message Wu of any user u in the asymptotic case. The policy is again to distribute transmission resources equally among (active) Rxs of any given BS. To this end, we choose the quantization rates regarding μF:

  • If μF2M, transmission resource of a fronthaul link is equally allocated between Rxs
    Rq1=μF3·12log(1+P),Rq2=μF2·12log(1+P), (37)
    and the achievable DoF is given as
    DoFμF,μBBU,r=μF3t219t2. (38)
  • If 2MμF3M, transmission resource of a fronthaul link is equally allocated among Rxs of a BS with three users; however, any BS with two users quantizes its receive signals at the maximum rate at each Rx since each fronthaul link has enough capacity to support that communication rate (MμF2):
    Rq1=μF3·12log(1+P),Rq2=M·12log(1+P), (39)
    and the achievable DoF is given as
    DoFμF,μBBU,r=μF3t23t+2+M6t69t2. (40)
  • If μF3M, all BSs quantize their receive signals at the maximum quantization rate (MμF3):
    Rq1=Rq2=M·12log(1+P), (41)
    and the achievable DoF is given as
    DoFμBBU,μF,r=M3t13t. (42)

5.2.2. Case 2: μBBUnhM

Under this condition, depending on μF, the achievable sum-DoF of a h-cluster can be restricted by the processing capacity prelog μBBU. Achievable sum-DoF is given in the numerator of (36). Therefore, if the processing capacity prelog μBBU is not smaller than the achievable sum-DoF of a h-cluster for the given interval of μF:

  • If μF3t21μBBUnhM for μF2M

  • If μF3t23t+2+M6t6μBBUnhM for 2MμF3M

  • If μBBU=nhM for 3MμF

The process that has been implemented in Section 5.2.1 is applied and, hence, the DoF expressions are given as in (38), (40) and (42), respectively. However, if the processing capacity prelog μBBU is smaller than the sum-DoF for the given μF:

  • If μBBUμF3t21 for μF2M,

  • If μBBUμF3t23t+2+M6t6 for 2MμF3M,

  • If μBBUnhM for μF3M,

We distribute the processing resource of a BBUP equally among sectors of a cluster and the quantization rate at each sector is chosen as

Rq1=Rq2=μBBUnh·12log(1+P),

which leads to:

DoFμF,μBBU,r=μBBU9t2. (43)

To provide fairness among the achievable DoFs of users, instances of the proposed scheme are time-shared so that each mobile user takes all relative positions in a h-cluster, which requires

1rh=3t2, (44)

different instances.

6. DoF without Sectorization

In the two proposed achievability schemes (“p-clustering” and “h-clustering”), we considered three non-interfering sectors in each cell. Now, if we consider cells without sectors, we can naively adapt our clustering by deactivating all users in the border cells of clusters. That is, for p-clustering, it requires deactivation of all users in the cells with one or two active mobile users and, for h-clustering, it requires deactivation of all users in the corner cells and the cells with two active users. This means that the network consists of only cells with three active users and cells with no active users for both schemes. This would again partition the network into non-interfering p-clusters and h-clusters without changing the rp and rh for any given t1,t2 pair or t, respectively.

By following the similar procedure introduced in Section 4 and Section 5, one can easily state the following result by simply distributing the available transmission resources equally among three Rxs of a given BS as long as the BBUP capacity is enough or, otherwise, distributing BBUP processing resources equally among the Rxs of a p-cluster/h-cluster. This leads to the following lemma:

Lemma 1

(DoF for naive scheme). For any μBBU>0, μF>0 and 0<r1, the achievable DoF in a multi cloud based non-sectored cellular network is given by

DoFnaiveμBBU,μF,rconv hullDoFP,naiveμBBU,μF,r,DoFH,naiveμBBU,μF,r (45)

where

DoFP,naiveμBBU,μF,r=maxt1,t2minμFt1t2t1t2+13t1t2,μBBU3t1t2,ifμF3Mmaxt1,t2minM1t1+t21t1t2,μBBU3t1t2,ifμF3M (46)

and above maximizations are over all positive integers t1,t2 satisfying t1t21r, and

DoFH,naiveμBBU,μF,r=maxtminμF3t23t+29t2,μBBU9t2,ifμF3MmaxtminM3t23t+23t2,μBBU9t2,ifμF3M (47)

where above maximizations are over all positive integers t satisfying t13r.

Notice that the same cut-set bound, Theorem 2, applies for the naive schemes since the observation functions, Definition 1, are defined not on the sector basis but on the BS basis.

7. Numerical Results and Discussion

In this section, we present simulation results to evaluate the proposed coding schemes for p-clustering and h-clustering. In Figure 4a, we investigate effect of clustering size on the achievable DoF for several fronthaul capacities μF=[3,7,11] and μBBU=428. We define size of a p-cluster as inverse of rp, i.e., 1rp=t1t2, and we denote it also with side length pair t1,t2. We define size of a h-cluster as inverse rh, i.e., 1rh=3t2, and we denote it also with the parameter t. It is observed that, for p-clustering, when the fronthaul capacity is small, i.e., μFM, clustering size has no effect on DoF since μF becomes a bottleneck. In general, we see that, for both p-clustering and h-clustering, the clustering size giving highest DoF decreases with μF. The figure verifies the Remark 1 since, for all rp=rh, p-clustering outperforms h-clustering for μF=3,7. It is also interesting to note that, for p-clustering, the achievable DoF is not monotonically increasing(decreasing) until(after) reaching the maximum for μF=11 (i.e., 2M<μF3M) since not only the clustering size but also the side length of the p-cluster is important for exploiting interference. For any rp, choosing a t1,t2 pair that is the minimum in the sum gives the maximum DoF since it provides higher joint processing gain for a p-cluster for the given size (i.e., 1rp), i.e., the more t1 and t2 becomes closer to each other the more mutual information clusters have. Therefore, larger p-cluster sizes may not result in higher DoF owing to the side length effect. However, for μF2M, the side lengths of p-cluster has no effect on achievable DoF for a given cluster size.

Figure 4.

Figure 4

The impact of rp: (a) For various values of μF. (b) For various values of μBBU.

Figure 4b shows the effect of clustering size on DoF for various values of μBBU=[100,300,500] and μF=12. It is seen that, for each μBBU, achievable DoF increases with cluster size until it becomes a bottleneck, i.e., until μBBU becomes active in the achievability expression. Accordingly, the results clearly indicate that having more processing power makes possible larger cluster sizes and hence larger DoF.

In Figure 5, we plot the achievable DoF and cut-set bound vs μF for M=4, r=0.025 and μBBU=428, which refers the case BBUP processing capacity is equal to the required processing capacity when each receive signal in a p-cluster of size t1,t2=5,8 is quantized at the maximum quantization rate Rq=M2log(1+P). From the figure, we can deduce that almost upper bound for μF2M can be reached, which means that 2M3 DoF is almost achievable at μF=2M given that processing capacity is high enough. In Figure 5, the operating points of clustering sizes is also depicted. For μF8, equivalently 2M, any p-clustering with 1rp=40 gives the highest achievable DoF for the given system parameters. However, for μF>8, there are several different operating points. For example, for 8<μF9.4, the h-clustering of size t=4 is the optimal clustering size, which means, for μF>2M, dividing the network into h-clusters provides higher joint processing gain than p-clustering for the same rh=rp if the BBUP processing capacity is enough. For the rest, the clustering size rp is decreasing with μF due to the given BBUP capacity is not enough to handle the quantized data for larger cluster sizes. At the operating point μF=12, which allows maximum quantization rate for each receive signal, the p-clustering of size t1,t2=5,8 achieves capacity. This proves that the proposed scheme utilizes the system resources optimally at this operating point and almost 9M10 DoF is achievable. We plot also the lower bound on DoF achieved by the naive scheme vs. μF for the same parameters. We can clearly see that the performance of the proposed schemes is considerably better than naive schemes due to the sectorization gain brought by nulling intra-cell interference.

Figure 5.

Figure 5

The impact of μF at μBBU=428.

In Figure 6, we plot the achievable DoF and cut-set bound as a function of processing capacity prelog μBBU, for r=0.025 and μF=12, which means that the fronthaul capacity has no restrictive effect on the achievable DoF. The operating points of clustering sizes regarding μBBU is also presented. The plot clearly indicates that the cut set bound is achieved until μBBU=428, i.e., the processing resources is used efficiently even until achieving 9M10 DoF. At the rest of the μBBU range, it is seen that the optimal clustering sizes (1rp or 1rh) increase with μBBU, and for most of μBBU>428, h-clustering provides highest DoF. This indicates the advantage of employing h-clustering when the processing capacity is high enough. For some range of μBBU, both h-clustering of size t=4 and p-clustering of size t1,t2=8,8 provide the highest DoF, which shows that h-clustering with lower clustering size provides higher joint processing gain than p-clustering with larger clustering sizes due to clustering geometry. The figure also depicts the lower bound achieved by the naive approach vs. μBBU for the same parameters and the gain of sectorization is clearly seen for higher values of processing capacity.

Figure 6.

Figure 6

The impact of μBBU at μF=12.

8. Finite SNR Analysis

In this section, we compare finite SNR performances of the proposed schemes with several other schemes, which will be introduced later on. For the finite SNR case, the quantization rates for both proposed clusterings are chosen as stated in Section 4.2 and Section 5.2, but the conditions regarding a high SNR regime are not applied, i.e., the prelog of any quantization rate is not reduced to the number of antennas M. Then, each BBUP implements joint decoding for the users of the associated cluster after reconstructing all sector receive signals of the cluster. For simplicity, we present the comparisons for M=1 throughout the section.

To evaluate the performance of the proposed schemes at finite SNR values, other than naive schemes, we compare our schemes with three different schemes:

  • Scheme 1 is a variation of the proposed p-clustering scheme. In p-clustering, each p-cluster is surrounded by deactivated users located on the sides of t1,t2-hop parellelogram, where each side has t1 and t2 deactivated users, respectively. For each p-cluster, we associate all deactivated users on the lower side and right side of a t1,t2-hop parellelogram to the p-cluster under consideration. Subsequently, we activate all deactivated users and allow each BBUP to collect quantization messages of reactivated user sectors associated with its own p-cluster. This process partitions the network into non-overlapping but interfering paralleogram-like clusters, which we call Ip-clusters later on; see Figure 7 for an example of t1,t2=4,3. Note that Ip-clustering requires the same BBUP-BS ratio rp as for a p-clustering case. With reactivation of all deactivated mobile users, there are 3t1t2 active users in each Ip-cluster and all cells consists of three active users. Therefore, each BS equally partitions its fronthaul transmission resources to Rxs if BBU processing resources is enough to implement the joint decoding; otherwise, the processing resources is evenly distributed among all Rxs of the Ip-cluster, i.e., the quantization rate is chosen as
    maxt1,t2minμF3,μBBU3t1t2·12log(1+P) (48)
    over all positive integer t1,t2 pairs satisfying t1t21r. To be able to guess the user messages, each BBUP implement joint decoding by treating out-of-cluster interference as noise.
  • Scheme 2 is a variation of the proposed h-clustering scheme. In h-clustering, there are 6t deactivated users around a cluster of size-t. For a specific h-cluster, we associate the deactivated users on the borders of any three adjacent h-clusters, e.g., east, southeast, and southwest, to the h-cluster under consideration. Then, we replicate this process for each h-cluster with the same relative directions of adjacent h-clusters. Subsequently, we reactivate all deactivated users and allow each BBUP k to collect the quantized received signals of sectors of reactivated users associated with its own h-cluster. This process partitions the network into interfering but non-overlapping clusters, which we call Ih-cluster in the following, see Figure 8 for t=2. Note that Ih-clustering requires the same BBUP-BS ratio as for the h-clustering case. With reactivation of deactivated users, there are 9t2 active users in each Ih-cluster. Therefore, by applying similar arguments as stated above, the quantization rate for Ih-clustering is chosen as
    maxtminμF3,μBBU9t2·12log(1+P) (49)
    over positive integers t satisfying t13r. To be able to guess the user messages, each BBUP implement joint decoding by treating out-of-cluster interference as noise.
  • Scheme 3 is a variation of the practical opportunistic schemes. The decoding depends on the realization of the channel coefficients. With the help of neighbors of the considered BS, the corresponding BBUP identifies for each user in the corresponding cell the three adjacent sectors that give the best joint decoding performance for the corresponding message. To be able to make a fair comparison between the proposed schemes and the 3-sector decoding scheme, we impose the same fronthaul rate constraint on the 3-sector decoding scheme as in the non-interfering clustering scheme (note that there is no silenced user in the 3-sector decoding case) by assuming all processing resources are used. That is, the quantization rates are chosen as
    Rq=minμF3,μBBU3·1r·12log(1+P). (50)

    Then, the BBUP collects the quantization messages and decodes the corresponding message based on them.

Figure 7.

Figure 7

Ip-clustering for t1,t2=4,3. The red lines denote a paralleogram-like shape of the clusters. The interference pattern highlighted with solid black lines depict the users in in the same Ip-clusters. The interference pattern highlighted with dashed lines between circles denote the borders between Ip-clusters.

Figure 8.

Figure 8

Ih-clustering for t=2. The interference pattern highlighted with solid black lines depict the users in in the same Ih-clusters. The interference pattern highlighted with dashed lines between circles denote the borders between Ih-clusters.

In our numerical comparison, we average the rate over 5000 independent channel realizations of the channel matrices, where for each realization all channel gains are drawn independently of each other according to a Gaussian distribution, by which we aim at modeling the random location of a mobile user. The direct channel gains of intra-sector links are drawn with variance 1 and the cross channel gains of inter-sector links are drawn with variance α2<1 since any mobile user in adjacent sectors can not be closer to a sector receiver than the user in the considered sector, where α is the channel attenuation coefficient. Figure 9 presents the comparison of the performances of the proposed schemes with naive schemes, Ip-clustering, Ih-clustering schemes and 3-sector decoding scheme vs. SNR when r=110. The simulations are performed for different cluster sizes such that t1t2=10,11and12 and t=2. However, in all the subfigures of Figure 9, we present only the ones showing relatively better performance than others to make presentation better.

Figure 9.

Figure 9

Comparison of the achieved rates for different channel attenuation parameters α and processing capacities μBBU when r=110 and μF=15.

As seen from all the subfigures of Figure 9, the proposed schemes provides higher sum-rates than naive schemes for all SNR range and, under all scenarios, e.g., strong interference regime at low BBUP processing capacity as in Figure 9b, or low interference regime at high BBUP capacity as in Figure 9e.

By comparing the subfigures of Figure 9 for a given α, we conclude that the proposed schemes become more efficient if the processing capacity of BBUPs increases, i.e., the allowed quantization rate increases. In addition, we can see that employing the smallest possible cluster for a given r is more advantageous for small processing capacities. For example, for α=0.9, while the p-clustering scheme for (t1,t2)=(5,2) shows better performance than other proposed schemes of larger cluster sizes at all SNR range for μBBU=30, it outperforms the h-clustering for t=2 only at low SNR values for μBBU=60, and it does not outperform either h-clustering for t=2 or p-clustering for (t1,t2)=(5,2) at any SNR value for μBBU=120.

By comparing the subfigures of Figure 9 for a given μBBU, we can observe that, for each μBBU value, the SNR range in which the performance of the 3-sector decoding scheme is superior to or close to the proposed schemes decreases when the channel attenuation coefficient is higher. In addition, we see that, for μBBU=60and120, the SNR range in which the h-clustering for t=2 outperforms the Ip-clustering for (t1,t2)=(5,2) and/or Ih-clustering for t=2 increases with the channel attenuation coefficient. We infer that the idea of isolated clustering is more advantageous at strong interference regime.

Another general conclusion that we can draw from simulation results presented in Figure 9 is that, if the processing capacity is high enough, i.e., the quantization rate is high enough, decomposing the network into hexagonal-type clusters achieves higher rates than paralellogram-type clusters especially at moderate and high SNR range even if rh=rp. This is due to geometrical structure of hexagonal-type clustering that includes more users for both h-cluster/Ih-cluster and less interfererers for Ih-cluster in comparison with the parallelogram clusters for the same rh=rp.

An interesting conclusion from the finite SNR analysis is that interfering clusterings show close performance to the proposed schemes in the finite SNR range; therefore, the interfering clusterings can also be employed at finite SNR values, since it may be more convenient for practical systems.

9. Conclusions

In this paper, we analyze the uplink per-user DoF of M-CRAN based sectored cellular networks. The main features of this paper are the following: it proposes efficient ways of decomposing the network into non-interfering clusters for M-CRAN scenarios, and it characterizes per-user DoF as a function of fronthaul and processing capacity prelogs, and BBUP-BS ratio. The lower bound is obtained through two coding schemes based on decomposing the network into non-interfering parallelogram and hexagonal clusters, respectively. In both schemes, BSs apply point-point quantization to receive signals and send the quantization messages to the associated BBUPs over fronthaul links for joint decoding.

Simulation results show that, for small and moderate fronthaul capacities, the achievability gap between lower and cut-set bounds decreases with an inverse of the BBUP-BS ratio. Therefore, the cut-set bound is almost achieved even for small cluster sizes at this range of fronthaul capacities. For higher fronthaul capacity prelogs, the achievability gap is not always tight but decreases with processing capacity prelog.

The finite SNR analysis shows that the proposed schemes outperform the naive schemes at all SNR ranges and, under all scenarios, the interfering clustering cases at all SNR range under strong interference regime when the BBUP processing capacity is scarce and moderate, and the 3-sector decoding case at all SNR range under strong interference regime if the BBUP processing capacity is moderate and high. In other scenarios for interfering clustering and 3-sector decoding cases, the proposed schemes always achieve higher sum-rates except low SNR values.

In general, the results provide valuable insights into appropriate clustering ways for mobile users/sectors, emphasizing the isolation of clusters, particularly if inter-cell interference is highly detrimental.

Appendix A. Proof of Remark 1

By (25), any t1*,t2* pair that satisfies t1*t2*=1r provides the maximum number of BBUP deployment for parallelogram clustering. By (35), t*=13r is the minimum cluster size that can be created for the given r, and hence provides the maximum possible number of BBUP deployment for hexagon clustering. Note that t1*t2*3t*2 for r0,1.

We now check the cases for μFM and MμF2M.

Appendix A.1. Case 1: μFM

Proposition A1.

From (14), the achievable DoF for Parallelogram Scheme can be written as:

DoFPμBBU,μF,r=μBBU3t1*t2*ifμBBUμFt1*t2*μF3ifμBBUμFt1*t2* (A1)

and, from (15), the achievable DoF for Hexagon Scheme can be written as:

DoFHμBBU,μF,r=μBBU313t*2,ifμBBUμF3t*21maxμF3t219t2,μBBU9t+12,ifμBBUμF3t*21 (A2)

for t satisfying

μF3t21μBBUμF3t+121. (A3)

Proof. 

The first part of the proposition, i.e., (A1), is straightforward. For (A2), note that, for a given μBBU>0, there is a unique tZ+ that satisfies (A3) and the maximization term in (A2) comes from the fact that, to implement the hexagonal scheme, we choose the design parameter t that gives the maximum DoF of among minimums found for satisfying t13r. From (15), we infer that the term μF3t219t2 is active in the minimization process for tt13r since μBBUμF3t21, and that the term μBBU9t2 is active in lower bound for t>t since μBBUμF3t+121. Therefore, the achievable DoF by hexagon scheme is given by the second term of (A2) if μBBUμF3t*21.  □

We now check all possible intervals of μBBU regarding (A1) and (A2).

Appendix A.1.1. μBBUmin{μF(3t1*t2*),μF(3t*21)}

The DoF is given as:

DoFμBBU,μF,rmaxμBBU3t1*t2*,μBBU313t*2,=μBBU3t1*t2*, (A4)

since t1*t2*3t*2 for any r0,1.

Appendix A.1.2. μF(3t*21)μBBUμF(3t1*t2*)

The DoF is given as:

DoFμBBU,μF,rmaxμBBU3t1*t2*,maxμF3t219t2,μBBU9t+12=μBBU3t1*t2* (A5)
Proof. 

Notice that the given condition on μBBU implies t=t* and t1*t2*=3t*2; otherwise, the imposed condition on μBBU is not possible. In addition, notice that, even for the maxμBBU=μF3t1*t2*=μF3t*2, the following inequality holds:

μF3t*219t*2μBBU9t*+12t*Z+, (A6)

and therefore

maxμF3t*219t*2,μBBU9t*+12=μF3t*219t*2. (A7)

Then, we end up with:

maxμBBU3t1*t2*,μF3t*219t*2=μBBU3t1*t2*, (A8)

since minμBBU=μF3t*21 and t1*t2*=3t*2.  □

Appendix A.1.3. μF(3t1*t2*)μBBUμF(3t*21)

The DoF is given as:

DoFμBBU,μF,rmaxμBBU313t*2,μF3=μF3 (A9)
Proof. 

The condition μBBUμF3t*21 implies μBBU<μF3t*2, then

μF3μBBU313t*2. (A10)

 □

Appendix A.1.4. μBBUmax{μF(3t1*t2*),μF(3t*21)}

Thel DoF is given as:

DoFμBBU,μF,rmaxμF3,maxμF3t219t2,μBBU9t+12=μF3. (A11)
Proof. 

If μF3t219t2 is active in the inner maximization, then

μF3>μF3t219t2tZ+. (A12)

If μBBU9t+12 is active in the inner maximization, we infer that the term μBBU9t+12 is active in hexagon bound when the design parameter is chosen as t+1, which means

μBBU9t+12μF3t+1219t+12. (A13)

Therefore, the fact that

μF3>μF3t+1219t+12tZ+ (A14)

implies

μF3>μBBU9t+12. (A15)

 □

Appendix A.2. Case 2: MμF2M

Proposition A2.

From (14), the achievable DoF for Parallelogram Scheme can be written as:

DoFPμBBU,μF,r=μBBU3t1*t2*,ifμBBUM+μFt1*t2*1maxM+μFt1t213t1t2,μBBU3t1t2+1,ifμBBUM+μFt1*t2*1 (A16)

for any pair t1,t2 satisfying

M+μFt1t21μBBUM+μFt1t2, (A17)

and, from (15), the achievable DoF for Hexagon Scheme can be written as:

DoFHμBBU,μF,r=μBBU9t*2,ifμBBUμF3t*21maxμF3t219t2,μBBU9t+12,ifμBBUμF3t*21 (A18)

for t satisfying

μF3t21μBBUμF3t+121. (A19)

Proof. 

For any given μBBU>0, there is a unique positive integer c=t1t2 that satisfies (A17). The maximization in (A16) can be inferred from (14)) by a similar approach given for (A2) in Appendix A.1. Note the DoF expression of hexagon case does not change for MμF2M.  □

We now check all possible intervals for μBBU regarding Equations (A16) and (A18).

Appendix A.2.1. μBBUmin{M+μF(t1*t2*1),μF(3t*21)}

The DoF is given as:

DoFμBBU,μF,rmaxμBBU3t1*t2*,μBBU9t*2=μBBU3t1*t2* (A20)

since t1*t2*3t*2 for any r0,1.

Appendix A.2.2. μF(3t*21)μBBUM+μF(t1*t2*1)

The DoF is given as:

DoFμBBU,μF,rmaxmaxμF3t219t2,μBBU9t+12,μBBU3t1*t2*=μBBU3t1*t2* (A21)

for t satisfying (A19).

Proof. 

Notice that the imposed condition on μBBU implies t=t* since there is a unique tZ+ satisfying (A19) and μBBUμF3t*21. The rest is trivial. Since maxt1*t2*=3t*2,

μBBU3t1*t2*>μBBU9t*+12 (A22)

and since the condition requires μBBUμF3t*21, then

μBBU3t1*t2*μF3t*219t*2. (A23)

 □

Appendix A.2.3. M+μF(t1*t2*1)μBBUμF(3t*21)

The DoF is given as:

DoFμBBU,μF,rmaxμBBU9t*2,maxM+μFt1t213t1t2,μBBU3t1t2+1=maxM+μFt1t213t1t2,μBBU3t1t2+1 (A24)

for t1,t2 satisfying with (A17).

Proof. 

Notice that, for any given μBBU>0, (A17) holds for a unique positive integer c=t1t2. The imposed condition implies

t1t2<3t*2, (A25)

because assuming t1t23t*2 implies

M+μFt1t2μBBUM+μFt1t21,M+μF3t*21, (A26)

which is in contradiction with the condition imposed on μBBUμF3t*21. Hence,

  • If μBBU3t1t2+1 is active in the inner maximization of (A24),
    μBBU3t1t2+1μBBU9t*2. (A27)
  • If M+μFt1t213t1t2 is active in the inner maximization of (A24), then
    M+μFt1t23t1t2μBBU3t1t2+1 (A28)
    which implies
    M+μFt1t23t1t2μBBU9t*2 (A29)
    by (A27).

 □

Appendix A.2.4. μBBUmax{M+μF(t1*t2*1),μF(3t*21)}

The DoF is given as:

DoFμBBU,μF,rmaxmaxM+μFt1t213t1t2,μBBU3t1t2+1,maxμF3t219t2,μBBU9t+12=maxM+μFt1t213t1t2,μBBU3t1t2+1 (A30)

for t1,t2 satisfying (A17) and t satisfying (A19).

Proof. 

Notice that, for any given μBBU>0, Equations (A17) and (A19) hold for a unique positive integer c=t1t2 and a unique t. For any given μBBU, Equations (A17) and (A19) impose

M+μFt1t21μF3t+121, (A31)

which implies

t1t2<3t+12. (A32)

Equations (A17) and (A19) also impose

μF3t21M+μFt1t2, (A33)

which implies

t1t2>3t2. (A34)

We now check the following cases:

  • If M+μFt1t213t1t2μBBU3t1t2+1 in the first inner maximization of (A31), then
    M+μFt1t213t1t2μF3t219t2 (A35)
    for any triplet t,t1,t2Z+ satisfying (A34), and also
    M+μFt1t213t1t2μBBU3t1t2+1 (A36)
           μBBU9t+12 (A37)
    for any triplet t,t1,t2Z+ satisfying (A32).
  • If μBBU3t1t2+1M+μFt1t213t1t2 in the first maximization of (A31), then
    μBBU3t1t2+1μBBU9t+12 (A38)
    for any triplet t,t1,t2Z+ satisfying (A32), and
    μBBU3t1t2+1M+μFt1t213t1t2 (A39)
         μF3t219t2 (A40)
    for any triplet t,t1,t2Z+ satisfying (A34).

 □

This completes the proof for Remark 1.

Appendix B. Proof of Theorem 2

For the sake of simplicity, define YBBUk as the received signal of BBUP k:

YBBUk=ϕj,knYBj3n:jUk. (A41)

We obtain the first two terms of the upper bound by choosing the cut set

S=all base stations,j=1,,NSc=all BBUPs,k=1,,K

and defining

XS=Xj:jSYSc=YBBUk:kSc.

In that case, for any fixed BBUP to BS association for any given network, the total rate of all users is upper bounded by:

3·N·RuIXS;YSc=HYScHYSc|XSminK·μBBU,N·μF·12log(1+P) (A42)

where second inequality comes from applying (6) and (9) to received signals of BBUPs, which gives the first two terms by Definition 2. The third term comes from the fact that, by [35], the DoF a M×M MIMO system is upper bounded by M.

Appendix C. Proof of Corollary 1

For the first item, the matching occurs when the term with μF is active in both lower and upper bounds. For the rest, the matching occurs with the term μBBU and is active in both lower and upper bounds. Due to Remark 1, if μF2M, showing the matching cases between parallelogram lower bound and cut-set upper bound is enough. For μF2M, we show the matching cases between both lower bounds and cut-set bound.

For μFM, the term with μF is active in upper and lower bounds if μFμBBU·r and μFμBBUt1t2, respectively. Since t1t21r, choosing μFμBBUt1t2 implies μFμBBU·r. The term with μBBU is active in upper and lower bound if μBBU·rμF and μBBUt1t2μF, respectively, where the matching requires t1t2=1r.

For MμF2M, the term with μBBU is active in both upper and lower bounds if μBBU·rμF and μBBUM+μFt1t21, respectively, where the matching requires t1t2=1r.

For 2MμF3M, the term with μBBU is active in upper and parallelogram lower bound if μBBU·rμF and μBBUM2t1+2t23+μFt1t2t1t21, respectively, where matching requires t1t2=1r. If 1rZ+, there is at least one t1,t2 pair that results in t1t2=1r. However, unless μBBUmaxt1,t2M2t1+2t23+μFt1t2t1t21, the term with μBBU can not be active in lower bound. This imposes choosing the pair t1,t2 that minimizes t1+t2. The term with μBBU is active in upper and hexagon lower bound if μBBU·rμF and μBBUM6t6+μF3t23t2, where matching requires t=13r.

For 3MμF, the matching cases can be found by applying similar procedures as in the 2MμF3M case.

Appendix D. Proof of Theorem 3

Due to Remark 1, we do the achievability gap analysis only for paralleogram clustering. We do the analysis for one of the cases which leads to the maximum achievability gap. For other cases, a similar procedure can be applied.

  • If μFM, the maximum gap occurs when μF3 and μBBU3t1t2 is active in upper and lower bounds, respectively. Note that this assumption imposes μFrμBBUμF·t1·t2.
    ΔμBBU,μF,r=μF3μBBU3·t1·t2aμF3μF·1r3·t1·t2bμF3μF·1r3·1r=μF31r1r1r<μF3·1r (A43)
    where a is due to maxμBBU=μF·1r and b is due to mint1·t2=1r by (25).
  • If MμF2M, the maximum gap occurs when μBBU3·r and μBBU3·t1·t2 is active in upper and lower bound, respectively. Notice that this assumption imposes μBBUminμF·1r,M+μFt1t21.
    ΔμBBU,μF,r=μBBU·r3μBBU3·t1·t2aμBBU3r11rminμF·1r,M+μF1r13r11rbμF3·1rr11r<μF3·1r (A44)
    where a is due to mint1·t2=1r by (25), and b is due the fact that, if μF·1rM+μF1r1, there is equality, if M+μF1r1μF·1r, there is strict inequality.

Author Contributions

S.G. put forward the original ideas. S.G. developed this work in discussion with G.R.-B.O.; S.G. wrote the paper with comments from G.R.-B.O. All authors have read and agreed to the published version of the manuscript.

Funding

The work of Samet Gelincik is supported by Turkish Ministry of Education.

Conflicts of Interest

The authors declare no conflict of interest.

References

  • 1.Nasri R., Jaziri A. Analytical tractability of hexagonal network model with random user location. IEEE Trans. Wirel. Commun. 2016;15:3768–3780. doi: 10.1109/TWC.2016.2528245. [DOI] [Google Scholar]
  • 2.Tesfay T.T., Khalili R., Boudec J.-Y.L., Richter F., Fehske A. Energy saving and capacity gain of micro sites in regular LTE networks; Proceedings of the 6th ACM Workshop on Performance Monitoring and Measurement of Heterogeneous Wireless and Wired Networks—PM2HW2N ’11; Miami Beach, FL, USA. 31 October–4 November 2011. [Google Scholar]
  • 3.Bande M., El Gamal A., Veeravalli V.V. Degrees of freedom in wireless interference networks with cooperative transmission and backhaul load constraints. IEEE Trans. Inf. Theory. 2019;65:5816–5832. doi: 10.1109/TIT.2019.2914462. [DOI] [Google Scholar]
  • 4.Bande M., El Gamal A., Veeravalli V.V. Flexible backhaul design with cooperative transmission in cellular interference networks; Proceedings of the 2015 IEEE International Symposium on Information Theory (ISIT); Hong Kong, China. 14–19 June 2015; pp. 2431–2435. [Google Scholar]
  • 5.Veeravalli V.V., Gamal A.E. Interference Management in Wireless Networks: Fundamental Bounds and the Role of Cooperation. Cambridge University Press; Cambridge, UK: 2018. [Google Scholar]
  • 6.Ntranos V., Maddah-Ali M.A., Caire G. Cellular interference alignment. IEEE Trans. Inf. Theory. 2015;61:1194–1217. doi: 10.1109/TIT.2015.2389244. [DOI] [Google Scholar]
  • 7.Gesbert D., Hanly S., Huang H., Shamai S., Simeone O., Yu W. Multi-cell MIMO cooperative networks: A new look at interference. IEEE J. Sel. Areas Commun. 2010;28:1380–1408. doi: 10.1109/JSAC.2010.101202. [DOI] [Google Scholar]
  • 8.Atsan E., Knopp R., Diggavi S., Fragouli C. Towards integrating quantize-map-forward relaying into LTE; Proceedings of the 2012 IEEE Information Theory Workshop (ITW); Lausanne, Switzerland. 3–7 September 2012; pp. 212–216. [Google Scholar]
  • 9.Chen J., Mitra U., Gesbert D. Optimal UAV relay placement for single user capacity maximization over terrain with obstacles; Proceedings of the IEEE 20th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC); Cannes, France. 2–5 July 2019; pp. 1–5. [Google Scholar]
  • 10.Katz G., Zaidel B.M., Shitz S.S. On layered transmission in clustered cooperative cellular architectures; Proceedings of the 2013 IEEE International Symposium on Information Theory (ISIT); Istanbul, Turkey. 7–12 July 2013; pp. 1162–1166. [Google Scholar]
  • 11.Simeone O., Poor H.V., Somekh O., Shamai S. Local base station cooperation via finite-capacity links for the uplink of linear cellular networks. IEEE Trans. Inf. Theory. 2009;55:190–204. doi: 10.1109/TIT.2008.2008151. [DOI] [Google Scholar]
  • 12.Hanly S.V., Whiting P. Information-theoretic capacity of multi-receiver networks. Telecommun. Syst. 1993;1:1–42. doi: 10.1007/BF02136153. [DOI] [Google Scholar]
  • 13.Wyner A.D. Shannon-theoretic approach to a gaussian cellular multiple-access channel. IEEE Trans. Inf. Theory. 1994;40:1713–1727. doi: 10.1109/18.340450. [DOI] [Google Scholar]
  • 14.Shamai S., Zaidel B.M. Enhancing the cellular downlink capacity via co-processing at the transmitting end; Proceedings of the IEEE VTS 53rd Vehicular Technology Conference, Spring 2001. Proceedings (Cat. No.01CH37202); Rhodes, Greece. 6–9 May 2001; pp. 1745–1749. [Google Scholar]
  • 15.Sanderovich A., Shamai S., Steinberg Y., Kramer G. Communication via decentralized processing. IEEE Trans. Inf. Theory. 2008;54:3008–3023. doi: 10.1109/TIT.2008.924659. [DOI] [Google Scholar]
  • 16.Sanderovich A., Somekh O., Poor H.V., Shamai S. Uplink macro diversity of limited backhaul cellular network. IEEE Trans. Inf. Theory. 2009;55:3457–3478. doi: 10.1109/TIT.2009.2023732. [DOI] [Google Scholar]
  • 17.Simeone O., Somekh O., Poor H.V., Shamai S. Downlink multicell processing with limited-backhaul capacity. EURASIP J. Adv. Signal Process. 2009;2009:1–10. doi: 10.1155/2009/840814. [DOI] [Google Scholar]
  • 18.Cover T., El Gamal A. Capacity theorems for the relay channel. IEEE Trans. Inf. Theory. 1978;25:572–584. doi: 10.1109/TIT.1979.1056084. [DOI] [Google Scholar]
  • 19.Costa M. Writing on dirty paper (Corresp.) IEEE Trans. Inf. Theory. 1983;29:439–441. doi: 10.1109/TIT.1983.1056659. [DOI] [Google Scholar]
  • 20.Checko A., Christiansen H.L., Yan Y., Scolari L., Kardaras G., Berger M.S., Dittmann L. Cloud RAN for Mobile Networks: A Technology Overview. IEEE Commun. Surv. Tutor. 2015;17:405–426. doi: 10.1109/COMST.2014.2355255. [DOI] [Google Scholar]
  • 21.Singhal M., Seyfi T., El Gamal A. Joint Uplink-Downlink Cooperative Interference Management with Flexible Cell Associations. arXiv. 20181811.11986 [Google Scholar]
  • 22.Kang J., Simeone O., Kang J., Shamai S. Layered Downlink Precoding for C-RAN Systems With Full Dimensional MIMO. IEEE Trans. Veh. Technol. 2017;66:2170–2182. doi: 10.1109/TVT.2016.2572199. [DOI] [Google Scholar]
  • 23.Park S., Simeone O., Shamai S. Uplink sum-rate analysis of C-RAN with interconnected radio units; Proceedings of the IEEE Information Theory Workshop (ITW); Kaohsiung, Taiwan. 6–10 November 2017; pp. 171–175. [Google Scholar]
  • 24.Kim J., Park S.-H. Layered Inter-Cluster Cooperation Scheme for Backhaul-Constrained C-RAN Uplink Systems in the Presence of Inter-Cluster Interference. Entropy. 2020;22:554. doi: 10.3390/e22050554. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 25.Douik A., Dahrouj H., Al-Naffouri T.Y., Alouini M. Distributed hybrid scheduling in multi-cloud networks using conflict graphs. IEEE Trans. Commun. 2018;66:209–224. doi: 10.1109/TCOMM.2017.2749573. [DOI] [Google Scholar]
  • 26.Awais M., Ahmed A., Ali S.A., Naeem M., Ejaz W., Anpalagan A. Resource management in multicloud iot radio access network. IEEE Internet Things J. 2019;6:3014–3023. doi: 10.1109/JIOT.2018.2878511. [DOI] [Google Scholar]
  • 27.Park S., Simeone O., Sahin O., Shamai S. Inter-cluster design of precoding and fronthaul compression for cloud radio access networks. IEEE Wirel. Commun. Lett. 2014;3:369–372. doi: 10.1109/LWC.2014.2317735. [DOI] [Google Scholar]
  • 28.Park S., Song C., Lee K. Inter-cluster design of wireless fronthaul and access links for the downlink of c-ran. IEEE Wirel. Commun. Lett. 2017;6:270–273. doi: 10.1109/LWC.2017.2671431. [DOI] [Google Scholar]
  • 29.Dhif-Allah O., Dahrouj H., Al-Naffouri T.Y., Alouini M. Distributed robust power minimization for the downlink of multi-cloud radio access networks. IEEE Trans. Green Commun. Netw. 2018;2:327–335. doi: 10.1109/TGCN.2017.2780449. [DOI] [Google Scholar]
  • 30.Ferdouse L., Anpalagan A., Erkucuk S. Joint Communication and Computing Resource Allocation in 5G Cloud Radio Access Networks. IEEE Trans. Veh. Technol. 2019;68:9122–9135. doi: 10.1109/TVT.2019.2927904. [DOI] [Google Scholar]
  • 31.Wigger M., Timo R., Shamai S. Conferencing in Wyner’s asymmetric interference network: Effect of number of rounds; Proceedings of the IEEE Information Theory Workshop (ITW); Jerusalem, Israel. 26 April–1 May 2015; pp. 1–5. [Google Scholar]
  • 32.Sesia S., Toufik I., Baker M. LTE-The UMTS Long Term Evolution: From Theory to Practice. Wiley; New York, NY, USA: 2009. [Google Scholar]
  • 33.El Gamal A., Kim Y. Network Information Theory. Cambridge University Press; Cambridge, UK: [DOI] [Google Scholar]
  • 34.Jeon S., Suh C. Degrees of Freedom of Uplink–Downlink Multiantenna Cellular Networks. IEEE Trans. Inf. Theory. 2016;62:4589–4603. doi: 10.1109/TIT.2016.2529839. [DOI] [Google Scholar]
  • 35.Telatar I.E. Capacity of multi-antenna gaussian channels. Eur. Trans. Telecommun. 1999;10:585–595. doi: 10.1002/ett.4460100604. [DOI] [Google Scholar]
  • 36.Gelincik S., Wigger M., Wang L. DoF in Sectored Cellular Systems with BS Cooperation Under a Complexity Constraint; Proceedings of the IEEE 15th International Symposium on Wireless Communication Systems (ISWCS); Lisbon, Portugal. 28–31 August 2018; pp. 1–5. [Google Scholar]

Articles from Entropy are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES